id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2006:0191
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2024-10406
|
SourceCodester Petrol Pump Management Software edit_fuel.php sql injection
|
A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:petrol_pump_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2024-1720
|
The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Display Name' parameter in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires social engineering to successfully exploit, and the impact would be very limited due to the attacker requiring a user to login as the user with the injected payload for execution.
|
[] | null | 4.7 | null | null | null |
|
CVE-2025-1531
|
Authentication credentials leakage vulnerability in Hitachi Ops Center Analyzer viewpoint OVF
|
Authentication credentials leakage vulnerability in Hitachi Ops Center Analyzer viewpoint.This issue affects Hitachi Ops Center Analyzer viewpoint: from 10.0.0-00 before 11.0.4-00.
|
[] | null | 6.5 | null | null | null |
GHSA-q676-r7fv-jgcc
|
The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2008:0555
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
GHSA-8477-3v39-ggpm
|
Improper Validation of Integrity Check Value in Bouncy Castle
|
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.
|
[] | null | 4.4 | null | null | null |
GHSA-rjw8-v7rr-r563
|
October System module has a Reflected XSS via X-October-Request-Handler Header
|
ImpactThe X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool.PatchesThis issue has been patched in v3.5.15.ReferencesCredits to:[Mayank Mehra](mailto:[email protected])For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | 3.1 | null | null | null |
GHSA-vgp9-2q73-rhh4
|
Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allows remote attackers to cause a denial of service (application freeze) "by sending invalid posts".
|
[] | null | null | null | null | null |
|
CVE-2018-13696
|
The mintToken function of a smart contract implementation for RedTicket, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:redticket_project:redticket:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-1755
|
NPS computy <= 2.7.5 - Results Deletion via CSRF
|
The NPS computy WordPress plugin through 2.7.5 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
|
[
"cpe:2.3:a:nps:computy:2.7.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-67f2-j5vg-639w
|
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
|
[] | null | 9.8 | null | null | null |
|
GHSA-ch5f-5368-9hw8
|
If a long user name is used in a username/password combination in a site URL (such as " http://UserName:[email protected]"), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service. This vulnerability affects Firefox < 55.
|
[] | null | null | 7.5 | null | null |
|
CVE-2010-0072
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is a buffer overflow in observiced.exe that allows remote attackers to execute arbitrary code via vectors related to a "reverse lookup of connections" to TCP port 10000.
|
[
"cpe:2.3:a:oracle:secure_backup:10.2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-pr49-5hhf-6mm6
|
Directory Traversal in serverabc
|
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | 7.5 | null | null |
GHSA-rhp6-27r4-xwgx
|
Cross-site scripting (XSS) vulnerability in form_header.php in MyMarket 1.71 allows remote attackers to inject arbitrary web script or HTML via the noticemsg parameter.
|
[] | null | null | null | null | null |
|
CVE-2013-3493
|
XnView 2.03 has an integer overflow vulnerability
|
[
"cpe:2.3:a:xnview:xnview:2.03:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2019-6156
|
In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.
|
[
"cpe:2.3:o:lenovo:510-15ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:510-15ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:510s-08ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:510s-08ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_300-20ish_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_300-20ish:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_300s-11ish_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_300s-11ish:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_510-15icb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_510-15icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_510a-15icb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_510a-15icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_510s-08ish_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_510s-08ish:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_620s-03ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_620s-03ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_720-18icb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_720-18icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_c530-19icb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_c530-19icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_c730-19ico_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_c730-19ico:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t530-28icb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t530-28icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_t730-28ico_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_t730-28ico:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y520t_z370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y520t_z370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y720_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y720_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y920_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y920_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lenovo_63_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:lenovo_63:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:h50-30g_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:h50-30g_desktop:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:m4500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:m4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:m4500_id_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:m4500_id:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:m4550_id_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:m4550_id:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:530s-07icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:530s-07icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_4500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_b4550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_b4550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_b4650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_b4650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_m4550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_m4550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_m4600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_m4600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qitian_m4650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qitian_m4650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qt_m410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qt_m410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qt_b415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qt_b415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qt_m415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qt_m415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e73_\\(sff\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e73_\\(sff\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e73_\\(twr\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e73_\\(twr\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e73s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e73s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e74_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e74:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e74s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e74s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e75t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e75t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e75s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e75s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e93_\\(sff\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e93_\\(sff\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e93_\\(twr\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e93_\\(twr\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4500k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4500k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4500q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4500q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m4600s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m4600s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6500t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6500s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6600q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6600q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6600t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m6600s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m6600s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m700q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m700q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m720q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m720q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m720t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m720t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m720s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m720s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m73_\\(sff\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m73_\\(sff\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m73_\\(twr\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m73_\\(twr\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m73_tiny_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m73_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m73p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m73p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m83_\\(sff\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m83_\\(sff\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m83_\\(tiny\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m83_\\(tiny\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m83_\\(twr\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m83_\\(twr\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8500t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8500s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8600t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8600s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8600s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920q_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m93_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m93:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m93p_\\(sff\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m93p_\\(sff\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m93p_\\(twr\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m93p_\\(twr\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m93p_tiny_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m93p_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_s510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_s510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v520s-08ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v520s-08ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v520t-15ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v520t-15ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_afh110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_afh110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_afh81_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_afh81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_afq150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_afq150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_mc_h110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_mc_h110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_mc_h110_pci_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_mc_h110_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_mc_h81_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_mc_h81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_me\\/we_h110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_me\\/we_h110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_mf\\/wf_h110_pci_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_mf\\/wf_h110_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_mf\\/wf_h81_pci_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_mf\\/wf_h81_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_ms\\/ws_h81_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_ms\\/ws_h81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_tc\\/wc_h110_pci_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_tc\\/wc_h110_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_tc\\/wcc_h81_pci_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_tc\\/wcc_h81_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yangtian_ytm6900e-00_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yangtian_ytm6900e-00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yta8900f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yta8900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio_910-27ish_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio_910-27ish:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio_y910-27ish_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio_y910-27ish:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio300-23isu\\(c5130\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio300-23isu\\(c5130\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio520-22ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio520-22ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio520-22iku_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio520-22iku:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio520-24ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio520-24ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio520-24iku_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio520-24iku:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:aio520-27ikl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:aio520-27ikl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_520s-23iku_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_520s-23iku:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_730s-24ikb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_730s-24ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:qt_a7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:qt_a7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcenter_m700z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcenter_m700z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcenter_m800z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcenter_m800z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e74z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e74z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e95z_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e95z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_e96z_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_e96z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m700z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m700z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m7300z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m7300z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m800z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m800z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m810z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m810z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m818z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m818z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m820z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m820z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8300z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8300z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m8350z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m8350z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m83z_\\(aio\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m83z_\\(aio\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m900z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m900z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m920z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m920z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m9500z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m9500z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m9550z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m9550z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_x1_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_x1_aio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310z\\(yt_s3150\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v310z\\(yt_s3150\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v410z\\(yt_s4250\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v410z\\(yt_s4250\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v510z_\\(yt_s5250\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v510z_\\(yt_s5250\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530-22icb\\(yt_s4350\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530-22icb\\(yt_s4350\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530-24icb\\(yt_s5350\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530-24icb\\(yt_s5350\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-14igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-14igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-15igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e570p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e560p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e560p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x380_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_c30_refresh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_c30_refresh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_d30_refresh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_d30_refresh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_e32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_e32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p318_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p318:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_tiny_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p330_tiny_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p330_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_s30_refresh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_s30_refresh:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 | null |
|
CVE-2019-9545
|
An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
|
[
"cpe:2.3:a:freedesktop:poppler:0.74.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2024-38769
|
WordPress Arconix Shortcodes plugin <= 2.1.11 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Tyche Softwares Arconix Shortcodes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Arconix Shortcodes: from n/a through 2.1.11.
|
[
"cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
GHSA-9w42-v5mm-2ffh
|
The SIP channel driver in Asterisk Open Source 1.2.x before 1.2.34, 1.4.x before 1.4.26.1, 1.6.0.x before 1.6.0.12, and 1.6.1.x before 1.6.1.4; Asterisk Business Edition A.x.x, B.x.x before B.2.5.9, C.2.x before C.2.4.1, and C.3.x before C.3.1; and Asterisk Appliance s800i 1.2.x before 1.3.0.3 does not use a maximum width when invoking sscanf style functions, which allows remote attackers to cause a denial of service (stack memory consumption) via SIP packets containing large sequences of ASCII decimal characters, as demonstrated via vectors related to (1) the CSeq value in a SIP header, (2) large Content-Length value, and (3) SDP.
|
[] | null | null | null | null | null |
|
GHSA-9x7h-25gj-xmfj
|
Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
|
[] | null | null | null | null | null |
|
CVE-1999-0821
|
FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument.
|
[
"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-g536-q3gw-6p2p
|
Siri in Apple iOS before 9.3.2 does not block data detectors within results in the lock-screen state, which allows physically proximate attackers to obtain sensitive contact and photo information via unspecified vectors.
|
[] | null | null | 2.4 | null | null |
|
GHSA-vqv6-r48r-39m7
|
Unspecified vulnerability in the OPMN component in Oracle Application Server 10.1.2.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is a format string vulnerability that allows remote attackers to execute arbitrary code via format string specifiers in an HTTP POST URI, which are not properly handled when logging to opmn/logs/opmn.log.
|
[] | null | null | null | null | null |
|
CVE-2022-26840
|
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:quartus_prime:*:*:*:*:standard:*:*:*",
"cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*"
] | null | 7.3 | null | null | null |
|
CVE-2017-6752
|
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) 9.3(3) and 9.6(2) could allow an unauthenticated, remote attacker to determine valid usernames. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. An attacker could exploit the vulnerability by performing a username enumeration attack to the IP address of the device. An exploit could allow the attacker to determine valid usernames. Cisco Bug IDs: CSCvd47888.
|
[
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-3w4c-hqgp-9fj3
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. User interaction is required for exploitation, as a victim must visit a malicious link or input data into a vulnerable web application.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2023:5627
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: LoadPin bypass via dm-verity table reload kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: use-after-free due to race condition in qdisc_graft() kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: hash collisions in the IPv6 connection lookup table kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null | null |
RHSA-2018:1451
|
Red Hat Security Advisory: eap6-jboss-ec2-eap security update
|
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 8.1 | null | null |
CVE-2024-48547
|
Incorrect access control in the firmware update and download processes of DreamCatcher Life v1.8.7 allows attackers to access sensitive information by analyzing the code and data within the APK file.
|
[
"cpe:2.3:o:dreamcatcher_iot_technology:dreamcatcher_life_firmware:1.8.7:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
CVE-2016-3100
|
kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_frameworks:*:*:*:*:*:*:*:*"
] | null | null | 8.4 | 2.1 | null |
|
GHSA-hh78-whh3-vp4q
|
Cuyahoga before 1.0.1 installs the FCKEditor component with an incorrect deny statement in a Web.config file, which allows remote attackers to upload files when these privileges were intended only for the Administrator and Editor roles.
|
[] | null | null | null | null | null |
|
GHSA-2c9m-w3h6-q5pr
|
Dell Pair Installer version prior to 1.2.1 contains an elevation of privilege vulnerability. A low privilege user with local access to the system could potentially exploit this vulnerability to delete arbitrary files and result in Denial of Service.
|
[] | null | 6.6 | null | null | null |
|
CVE-2020-3940
|
VMware Workspace ONE SDK and dependent mobile application updates address sensitive information disclosure vulnerability.
|
[
"cpe:2.3:a:vmware:workspace_one_boxer:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_content:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_content:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:vmware:workspace_one_intelligent_hub:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_notebook:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_people:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_piv-d_manager:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:xamarin:*:*",
"cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:apache_cordova:*:*",
"cpe:2.3:a:vmware:workspace_one_sdk:*:*:*:*:*:android:*:*",
"cpe:2.3:a:vmware:workspace_one_sdk_\\(objective-c\\):*:*:*:*:iphone_os:*:*:*",
"cpe:2.3:a:vmware:workspace_one_web:*:*:*:*:*:android:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2022-37437
|
Ingest Actions UI in Splunk Enterprise 9.0.0 disabled TLS certificate validation
|
When using Ingest Actions to configure a destination that resides on Amazon Simple Storage Service (S3) in Splunk Web, TLS certificate validation is not correctly performed and tested for the destination. The vulnerability only affects connections between Splunk Enterprise and an Ingest Actions Destination through Splunk Web and only applies to environments that have configured TLS certificate validation. It does not apply to Destinations configured directly in the outputs.conf configuration file. The vulnerability affects Splunk Enterprise version 9.0.0 and does not affect versions below 9.0.0, including the 8.1.x and 8.2.x versions.
|
[
"cpe:2.3:a:splunk:splunk:9.0.0:*:*:*:enterprise:*:*:*"
] | null | 7.4 | null | null | null |
GHSA-r94j-7j3g-wg4f
|
Heap buffer overflow in Vulkan in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)
|
[] | null | 8.8 | null | null | null |
|
CVE-2016-8566
|
An issue was discovered in Siemens SICAM PAS before 8.00. Because of Storing Passwords in a Recoverable Format, an authenticated local attacker with certain privileges could possibly reconstruct the passwords of users for accessing the database.
|
[
"cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-h3j9-g643-p927
|
IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
|
[] | null | null | null | null | null |
|
GHSA-c264-rp8f-rf64
|
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
GHSA-wf5c-vj9m-vm9w
|
The Kazakhstan Radio (aka com.wordbox.kazakhstanRadio) application 2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-5rj5-5628-7w5m
|
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-31251
|
WordPress Community by PeepSo plugin <= 6.3.1.1 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo.This issue affects Community by PeepSo: from n/a through 6.3.1.1.
|
[] | null | 4.3 | null | null | null |
GHSA-9qpj-59m6-fgwh
|
In Ant Design Pro 4.0.0, reflected XSS in the user/login redirect GET parameter affects the authorization component, leading to execution of JavaScript code in the login after-action script.
|
[] | null | 6.1 | null | null | null |
|
GHSA-p3jm-9qcf-m97r
|
D-Link DAP-2622 DDP Set SSID List PSK Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20101.
|
[] | null | null | 8.8 | null | null |
|
GHSA-7rjm-hcwm-8qgg
|
Mozilla 1.0 allows remote attackers to steal cookies from other domains via a javascript: URL with a leading "//" and ending in a newline, which causes the host/path check to fail.
|
[] | null | null | null | null | null |
|
GHSA-4r6h-8v6p-xvw6
|
Prototype Pollution in sheetJS
|
All versions of SheetJS CE through 0.19.2 are vulnerable to "Prototype Pollution" when reading specially crafted files. Workflows that do not read arbitrary files (for example, exporting data to spreadsheet files) are unaffected.A non-vulnerable version cannot be found via npm, as the repository hosted on GitHub and the npm package `xlsx` are no longer maintained.
|
[] | null | 7.8 | null | null | null |
GHSA-jwjr-63x8-g58w
|
A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.
|
[] | null | 5.5 | null | null | null |
|
GHSA-5h6m-fg6x-4p4v
|
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
|
[] | null | 5.5 | null | null | null |
|
CVE-2019-13980
|
In Directus 7 API through 2.3.0, uploading of PHP files is blocked only when the Apache HTTP Server is used, leading to uploads/_/originals remote code execution with nginx.
|
[
"cpe:2.3:a:rangerstudio:directus_7_api:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2024-24327
|
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the pppoePass parameter in the setIpv6Cfg function.
|
[
"cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-9c8w-jrw3-q2c3
|
Cross-site Scripting in OWASP AntiSamy
|
OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
|
[] | null | 6.1 | null | null | null |
RHSA-2017:1658
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update
|
openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null | null |
GHSA-hr85-6c3j-3cpx
|
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.
|
[] | null | null | null | null | null |
|
CVE-2020-17075
|
Windows USO Core Worker Elevation of Privilege Vulnerability
|
Windows USO Core Worker Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
RHBA-2020:2477
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
|
jenkins: CSRF protection bypass via crafted URLs jenkins: XSS in job configuration pages jenkins: Content-Security-Policy headers for files uploaded leads to XSS jenkins: improperly processes HTML content of list leads to XSS
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null | null |
GHSA-6gh5-794v-v6mc
|
Information leak vulnerability in the Agent Handler of McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 allows an unauthenticated user to download McAfee product packages (specifically McAfee Agent) available in ePO repository and install them on their own machines to have it managed and then in turn get policy details from the ePO server. This can only happen when the ePO Agent Handler is installed in a Demilitarized Zone (DMZ) to service machines not connected to the network through a VPN.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-31468
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D files embedded in PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13620.
|
[
"cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:foxit_reader:*:*",
"cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:phantompdf:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-m62g-7v8j-3fwc
|
app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org.
|
[] | null | 9.8 | null | null | null |
|
GHSA-3ghc-cw76-h292
|
Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
ICSA-19-330-02
|
ABB Relion 650 and 670 Series
|
An attacker may use a specially crafted message to force the device to reboot, which could cause a denial of service.CVE-2019-18247 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 5.3 | null | null |
GHSA-m6f4-gmx3-wr5w
|
In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-29415
|
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A denial of service (process hang) can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
|
[
"cpe:2.3:a:bzip3_project:bzip3:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2024-54929
|
KASHIPARA E-learning Management System v1.0 is vulnerable to SQL Injection in /admin/delete_subject.php.
|
[
"cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
RHSA-2019:0415
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: MIDI driver race condition leads to a double-free
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null | null |
GHSA-5fp7-mmwq-gvmw
|
In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-51937
|
WordPress IA Map Analytics Basic plugin <= 20170413 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Information Analytics IA Map Analytics Basic allows DOM-Based XSS.This issue affects IA Map Analytics Basic: from n/a through 20170413.
|
[] | null | 6.5 | null | null | null |
CVE-2017-1516
|
IBM Doors Web Access 9.5 and 9.6 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 129826.
|
[
"cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-8wfw-j7w7-xqj3
|
OpenVAS Manager 3.0 before 3.0.7 and 4.0 before 4.0.4 allows remote attackers to bypass the OMP authentication restrictions and execute OMP commands via a crafted OMP request for version information, which causes the state to be set to CLIENT_AUTHENTIC, as demonstrated by the omp_xml_handle_end_element function in omp.c.
|
[] | null | null | null | null | null |
|
CVE-2013-6655
|
Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-21612
|
Cross-site Scripting in TabberTransclude in Extension:TabberNeue
|
TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Prior to 2.7.2, TabberTransclude.php doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here. This vulnerability is fixed in 2.7.2.
|
[] | null | 8.6 | null | null | null |
CVE-2022-36582
|
An arbitrary file upload vulnerability in the component /php_action/createProduct.php of Garage Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
|
[
"cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-xrvc-5f74-4x4x
|
The CLUEVO LMS, E-Learning Platform WordPress plugin before 1.8.1 does not sanitise and escape Course's module, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
[] | null | null | null | null | null |
|
GHSA-q299-h828-h44m
|
Cisco WebEx Meeting Center does not properly determine authorization for reading a host calendar, which allows remote attackers to obtain sensitive information by obtaining a list of all meetings and then sending a calendar request for each one, aka Bug ID CSCur23913.
|
[] | null | null | null | null | null |
|
CVE-2009-1502
|
Directory traversal vulnerability in plugin.php in S-Cms 1.1 Stable and 1.5.2 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the page parameter.
|
[
"cpe:2.3:a:matteoiammarrone:s-cms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:matteoiammarrone:s-cms:1.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gv38-5q2v-rvgw
|
Vulnerability in the Oracle Order Management component of Oracle E-Business Suite (subcomponent: Product Diagnostic Tools). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Order Management executes to compromise Oracle Order Management. Successful attacks of this vulnerability can result in takeover of Oracle Order Management. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7 | null | null |
|
GHSA-6627-jcx5-j2g8
|
Java Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.18.00.
|
[] | null | 7.5 | null | null | null |
|
GHSA-qr9x-j6hh-jw37
|
TEMMOKU T1.09 Beta allows admin/user/add CSRF.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-24198
|
A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'
|
[
"cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-v9wg-49f7-4f43
|
The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
|
[] | null | null | null | null | null |
|
GHSA-c6fr-x99h-2jv7
|
FTPService.exe in Blackmoon FTP 3.1 Build 1735 and Build 1736 (3.1.7.1736), and possibly other versions before 3.1.8.1737, allows remote attackers to cause a denial of service (crash) via a large number of PORT commands with long arguments, which triggers a NULL pointer dereference. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2024-23240
|
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
|
[
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | null | null |
|
GHSA-97p9-r285-2g4p
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Maksym Marko Website price calculator allows SQL Injection.This issue affects Website price calculator: from n/a through 4.1.
|
[] | null | 8.5 | null | null | null |
|
GHSA-3c29-2h4x-fgg4
|
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
|
[] | null | 6.1 | null | null | null |
|
cisco-sa-dncm-xss-AvMyAwd2
|
Cisco Data Center Network Manager Cross-Site Scripting Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dncm-xss-AvMyAwd2"]
|
[] | null | null | 4.8 | null | null |
GHSA-qwg9-mmfv-xg7j
|
In multiple locations, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8.4 | null | null | null |
|
GHSA-jxwj-qccf-4896
|
Jenkins IFTTT Build Notifier Plugin vulnerability exposes IFTTT Maker Channel Keys
|
Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.These keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.As of publication of this advisory, there is no fix.
|
[] | null | 4.3 | null | null | null |
GHSA-wc9v-xvxc-2x5v
|
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.
|
[] | null | 7.8 | null | null | null |
|
CVE-2019-6773
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
GHSA-362v-m99f-grr8
|
In onCreate of InstallStart.java, there is a possible package validation bypass due to a time-of-check time-of-use vulnerability. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0 Android ID: A-140195904
|
[] | null | 6.7 | null | null | null |
|
CVE-2023-4427
|
Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-qwp4-jq8v-wpq4
|
XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at Xfpx!gffGetFormatInfo+0x0000000000028508."
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-27388
|
SUNRPC: fix some memleaks in gssx_dec_option_array
|
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: fix some memleaks in gssx_dec_option_array
The creds and oa->data need to be freed in the error-handling paths after
their allocation. So this patch add these deallocations in the
corresponding paths.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-qh23-548p-jvf7
|
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
|
[] | null | null | null | null | null |
|
CVE-2024-45109
|
Photoshop Desktop | Out-of-bounds Write (CWE-787)
|
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2012-6349
|
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x before 8.5.3 FP4, allows remote attackers to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
|
[
"cpe:2.3:a:autonomy:keyview_idol:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.5.3.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2025-32854
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockOpcSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] | 8.7 | 8.8 | null | null | null |
|
GHSA-whfj-p5r5-33pr
|
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
|
[] | null | 6.5 | null | null | null |
|
CVE-2016-1000121
|
XSS and SQLi in Huge IT Joomla Slider v1.0.9 extension
|
[
"cpe:2.3:a:huge-it:slider:1.0.9:*:*:*:*:joomla:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-cxx4-w85r-9fxh
|
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901.
|
[] | null | null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.